|Publication number||US7873991 B1|
|Application number||US 09/503,608|
|Publication date||Jan 18, 2011|
|Filing date||Feb 11, 2000|
|Priority date||Feb 11, 2000|
|Also published as||DE10101616A1, DE10101616C2|
|Publication number||09503608, 503608, US 7873991 B1, US 7873991B1, US-B1-7873991, US7873991 B1, US7873991B1|
|Inventors||Kira Sterling Attwood, Linwood Hugh Overby, Jr., Chien-En Sun|
|Original Assignee||International Business Machines Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (11), Non-Patent Citations (4), Referenced by (3), Classifications (12), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The invention relates generally to the field of networking and specifically to defending against attacks by malicious users attempting to disable a server by flooding the server with connectionless datagrams.
Flooding attacks have recently been used with Increasing frequency to target and disable servers on the Internet. A flooding attack occurs when a user sends a large number of requests to a server in a relatively short period of time with an intent to overload and thereby disable the server. A flood of packets from a malicious user can overload a server in the same way that a flood of packets from a misconfigured system can overload a server. But the end result is the same; the server becomes overloaded in trying to service the requests. This prevents legitimate requests from being timely served and often disables a server or causes it to crash. A number of flooding attacks have been reported in the news recently on some well known web sites. These attacks were characterized by a flood of individual connection requests to establish initial communications. A related patent application Ser. No. 09/502,478 filed Feb. 11, 2000, discloses an algorithm to defend against such connection request attacks. However, it is also possible to attack a server by flooding it with connectionless datagrams, such as might occur in the UDP (user datagram) protocol. The effect is essentially the same; the server becomes overloaded in trying to service the horde of datagrams and can even become totally disabled. Flooding attacks are very difficult for traditional intrusion detection systems to prevent due to the difficulty of determining whether the traffic is legitimate or not.
The invention recognizes that the consequences of intentional datagram flooding attacks and unintentional overload situations resulting from a burst of datagrams can be mitigated by dropping the traditional notion of attempting to distinguish between legitimate and illegitimate traffic. In the invention, all datagram traffic is subject to a policy that attempts to guarantee that legitimate work will be performed and a server will not crash in flooding situations, irrespective of whether the flooding is caused by legitimate or illegitimate datagram traffic. The invention helps to prevent a server from crashing due to overload and it prevents one or more attackers from consuming all server resources.
In response to the arrival of a datagram destined for a specified port on a server, the transmitting host is determined and the number of datagrams already queued for the same host and for the same port is determined. If this number exceeds a first threshold, the request for a connection is denied.
The first threshold is dynamically determined in the preferred embodiment. The owner of a server specifies for each port that is subject to datagram flooding checks a maximum number of queued datagrams (M) allowed at any time to the port and a controlling percentage (P) of available queue slots remaining for the port. The invention keeps track of the number (A) of queued datagrams for the port and it calculates the number of available queue slots (I) by subtracting the number of queued datagrams from the maximum number of datagrams (I=M−A). If the number of datagrams already queued for the transmitting host is equal to or greater than P times the number of queue slots left (=>P*I), then the present datagram is refused. Otherwise, the datagram is queued and the number of queued datagrams (A) for the port is incremented by one.
The maximum number of datagrams and the threshold percentage P will be difficult for most owners to configure. Therefore, a “statistics” mode is provided that measures normal traffic loads of different servers and suggests an appropriate maximum and threshold that will not hamper similar legitimate traffic loads. This statistics mode is not part of the claimed invention and is not described further herein.
In the drawing:
The invention requires that an owner of a server that uses the invention configure the server with certain parameters for use by the invention. By way of example, the preferred embodiment requires that the owner specify for each port number subject to datagram flooding checks a maximum number of datagrams (M) allowed at any time to be queued to the port and a controlling percentage (P) of available queue slots remaining for the port. The percentage P is used to establish a threshold to trigger the denial to service a datagram. As datagrams are queued and serviced, the server dynamically maintains the number of available queue slots for each port that is subject to flooding checks.
An entry is made to step 100 in
The identity (the IP address) of the sending host is also determined from the datagram. The port number is used by step 108 to locate a memory control block for the port or to create one if a port control block does not presently exist. Attached to the port control block are a plurality of host control blocks for hosts that presently have one or more datagrams in queue. If the sending host does not have a host control block, one is created. A host control block contains, among other things, a count of the port connections presently assigned to the host.
Step 108 determines from the datagram the identity of the transmitting host that initiated the datagram and it uses the port number and the host identity to locate a memory control block or it creates a memory control block if one does not presently exist. An existing memory control block contains, among other things, a count of the number of datagrams presently queued by the host. Step 108 determines the port number to which this datagram is directed.
At step 110, the server fetches from the memory control block the maximum number of queued datagrams M specified for this port number, the controlling percentage P and the number A of queued datagrams. Step 112 calculates the number I of available queue slots as M−A. Step 114 determines if the number of datagrams already queued to the transmitting host is equal to or greater than P times I. If so, then the datagram is discarded and the queuing algorithm exits at 118. On the other hand, if the number of queued datagrams already initiated by the transmitting host is less than P times I, the datagram is queued for service at step 116 and A is incremented by one to update the number of datagrams in queue for this port number.
The computer program that has been described can be executed on virtually any type of computer, ranging from personal computers to large mainframes such as IBM's System 390 machines. The only requirement is that the computer is configured with network communication software and is accessible as a server via a network.
Skilled artisans in the fields to which the invention pertains will recognize that numerous variations can be made to the embodiments disclosed herein and still remain within the spirit and scope of the invention.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5878224 *||Apr 30, 1997||Mar 2, 1999||Bell Communications Research, Inc.||System for preventing server overload by adaptively modifying gap interval that is used by source to limit number of transactions transmitted by source to server|
|US6052788 *||Apr 26, 1999||Apr 18, 2000||Network Engineering Software, Inc.||Firewall providing enhanced network security and user transparency|
|US6125397 *||Jun 3, 1998||Sep 26, 2000||Fuji Xerox Co., Ltd.||Data transfer apparatus and method using congestion recovery-type and congestion avoidance-type data transfers|
|US6182226 *||Mar 18, 1998||Jan 30, 2001||Secure Computing Corporation||System and method for controlling interactions between networks|
|US6219728 *||Apr 22, 1996||Apr 17, 2001||Nortel Networks Limited||Method and apparatus for allocating shared memory resources among a plurality of queues each having a threshold value therefor|
|US6317786 *||May 29, 1998||Nov 13, 2001||Webspective Software, Inc.||Web service|
|US6515963 *||Jan 27, 1999||Feb 4, 2003||Cisco Technology, Inc.||Per-flow dynamic buffer management|
|US6725378 *||Apr 15, 1999||Apr 20, 2004||Purdue Research Foundation||Network protection for denial of service attacks|
|US6735702 *||Aug 31, 1999||May 11, 2004||Intel Corporation||Method and system for diagnosing network intrusion|
|JP2000032056A||Title not available|
|JPH09218837A||Title not available|
|1||CERT Advisory CA-96.01: "Topic UDP Port Denial-of-Service Attack"; vom 24. Sep. 1997; CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University Pittsborugh Patentanspruch 15213-3890, USA.|
|2||Farrow, R. "TCP SYN Flooding Attacks and Remedies", Sep. 4, 1999.|
|3||Shiral, Y. "Why Asking for Bandwidth Control Technology", Computer & Network, OHM May 1, 199.|
|4||*||W. Richard Stevens, TCP/IP Illustrated, vol. 1 The Protocols, Addison-Wesley, Copyright 1994 pp. 33, 143-147.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8464276 *||Jan 11, 2010||Jun 11, 2013||Sprint Communications Company L.P.||Channel monitoring in a messaging-middleware environment|
|US9092282||Aug 14, 2012||Jul 28, 2015||Sprint Communications Company L.P.||Channel optimization in a messaging-middleware environment|
|US9264338||Apr 8, 2013||Feb 16, 2016||Sprint Communications Company L.P.||Detecting upset conditions in application instances|
|International Classification||G06F13/00, H04L12/56, H04L29/06, G06F15/00, G06F9/00|
|Cooperative Classification||H04L47/30, H04L63/1416, H04L63/1458|
|European Classification||H04L47/30, H04L63/14A1, H04L63/14D2|
|Feb 11, 2000||AS||Assignment|
Owner name: IBM CORPORATION, NEW YORK
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ATTWOOD, KIRA STERLING;OVERBY, LINWOOD HUGH, JR.;SUN, CHIEN-EN;REEL/FRAME:010634/0714
Effective date: 20000211
|Aug 29, 2014||REMI||Maintenance fee reminder mailed|
|Sep 26, 2014||SULP||Surcharge for late payment|
|Sep 26, 2014||FPAY||Fee payment|
Year of fee payment: 4